Static task
static1
Behavioral task
behavioral1
Sample
836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe
Resource
win10v2004-20231215-en
General
-
Target
eb7073f79738bc3871d8fdcdda2f6d07.bin
-
Size
3.9MB
-
MD5
5f3fafbf2c77008c59e2b9ec740811ea
-
SHA1
a57f33167c6c16f9fe1c637e91ff839a0d55d53a
-
SHA256
53cec1cb9e1e36cb8842d8e2a0a8eaf95f371adf94de813e9814ffe7453e9b4c
-
SHA512
54d0641727e5c5ee77695a58d14ac7d8e56fd3cd932f9f802ef235a4ba1153a95309cd569285215a05f0ec41ae914a6a4cc1e445e1e181fbb6cf4c0071132d2a
-
SSDEEP
98304:lVO6tiCeZw1yT5v6VD0yCsRWsC0rj7e5CHf0MCC76KAK682YYqE:lVOEwK+5vquseIHs1yyx85g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe
Files
-
eb7073f79738bc3871d8fdcdda2f6d07.bin.zip
Password: infected
-
836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe.exe windows:1 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ